<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T11:49:26.420974+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/952585b3-398c-40b5-8b3c-ec6c30c003c0/export</id>
    <title>952585b3-398c-40b5-8b3c-ec6c30c003c0</title>
    <updated>2026-05-07T11:49:27.227431+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "952585b3-398c-40b5-8b3c-ec6c30c003c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41999", "type": "seen", "source": "https://t.me/cvedetector/6644", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41999 - Smart-tab Android Debug Code Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41999 \nPublished : Sept. 30, 2024, 8:15 a.m. | 29\u00a0minutes ago \nDescription : Smart-tab Android app installed April 2023 or earlier contains an active debug code vulnerability. If this vulnerability is exploited, an attacker with physical access to the device may exploit the debug function to gain access to the OS functions, escalate the privilege, change the device's settings, or spoof devices in other rooms. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-30T10:48:22.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/952585b3-398c-40b5-8b3c-ec6c30c003c0/export"/>
    <published>2024-09-30T10:48:22+00:00</published>
  </entry>
</feed>
